WarBerryPi: Red Teaming Hardware Implant!

If you read this blog, you must have read about an earlier post titled – List of Raspberry Pi DIY Projects for Anonymity! Though that post dealt with DIY projects about anonymity, this post is about WarBerryPi, which is more of a device to be used for offensive activities such as red teaming built on the versatile Raspberry Pi platform.

The name WarBerryPi was conceived by the author as the red team, blue team nomenclature is based on military terms. This tool allows you to plug it in offering you remote connectivity so that you can continue your penetration tests from anywhere you wish!

What is WarBerryPi?

WarBerryPi is an open source Raspberry Pi based hardware implant that allows you to be stealthy during red teaming scenarios, obtaining information in a short time. Raspberry Pi 3 Model B is the suggested model since it has both has Bluetooth and WiFi modules embedded and ready to use. However, if you have any other models, they would work too as WarBerryPi will intelligently disable the modules that are not supported. Infact, some of these modules can also work on your Arduino board too! The standard Raspabian image or any other *NIX operating system is compatible with this red teaming hardware implant.

Tools used by WarBerryPi:

Depending on your requirements, the following tools are installed if they are not already present on your system:

That is all about installation. Now for the interesting part – the initial configuration requires that you set the hostname of this tool as warberry. However, the hostname is changed automatically by WarBerryPi after it sniffs a number of hostnames from the environment. It the checks for interesting ones like demo, dev, printer, etc. and makes name changes accordingly to blend in, so that it is harder to identify that this tool is running. In case the device can not connect “back” to you, and there is no other way for you to connect to it, you can even add a 3G board to be used as a separate and independent connection. The author takes care of this installation too!

When it comes to attacking, you have an option of launching a full TCP network scan, top 1000 TCP ports scan or a TCP & UDP port scan. This mode runs further tests such as DHCP service enumeration, internal/external IP reconnaissance, hostname enumeration, along with scans for Windows Machines, MongoDB Databases, VOIP, FTP, VNC, rlogin, MSSQL Databases, DNS, OpenVPN, MYSQL Databases, PHPMyAdmin, IPSec, Oracle Databases, TightVNC, NFS, IBM Websphere, WebServers, Firebird Databases, Printers, XServer, SVN, SNMP services. You can also use WarBerryPi for enumerating nearby WiFi networks & Bluetooth device names which can be later used for conducting phishing attacks.

Install WarBerryPi:

Installation instructions can be obtained here. Check out the tool directory for WarBerryPi v4.c1ghere.

Featured Post

Kali Linux 2019.1 is the latest Kali Linux release. This is the first 2019 release, which comes after Kali Linux 2018.4, that was made available in the month of October. This new release includes all patches, fixes, updates, and improvements since the last release – Kali Linux 2018.3, including a shiny new Linux kernel versionRead more about UPDATE: Kali Linux 2019.1 Release!